CVE-2026-3723

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in Simple Flight Ticket Booking System 1.0 allows attackers to manipulate database queries through the flightno parameter in /Admindelete.php. Remote attackers can potentially access, modify, or delete database contents. All deployments of version 1.0 are affected.

💻 Affected Systems

Products:
  • code-projects Simple Flight Ticket Booking System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable by default. Requires PHP environment with database backend.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, modification of flight booking records, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages exposed.

🌐 Internet-Facing: HIGH - Attack can be performed remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if system is network-accessible.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available. SQL injection via flightno parameter is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add parameter validation and use prepared statements for the flightno parameter in Admindelete.php

Replace vulnerable SQL queries with prepared statements using PDO or mysqli

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns

Configure WAF to detect and block SQL injection attempts

🧯 If You Can't Patch

  • Restrict access to /Admindelete.php using IP whitelisting or authentication
  • Implement database user with minimal permissions (read-only if possible)

🔍 How to Verify

Check if Vulnerable:

Test /Admindelete.php with SQL injection payloads in flightno parameter (e.g., flightno=1' OR '1'='1)

Check Version:

Check application version in source code or documentation files

Verify Fix Applied:

Test with same payloads and verify no SQL errors or unexpected behavior occurs

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in web server logs
  • Unusual database queries from web application
  • Multiple failed parameter validation attempts

Network Indicators:

  • HTTP requests to /Admindelete.php with SQL keywords in parameters
  • Unusual database traffic patterns

SIEM Query:

web.url:"*/Admindelete.php*" AND (web.param.flightno:"*'*" OR web.param.flightno:"*OR*" OR web.param.flightno:"*UNION*")

🔗 References

📤 Share & Export